Kernel DMA Protection Hardening to Secure Your Systems

Kernel DMA Protection Hardening to Secure Your Systems

4 Minutes Read Published on November 26, 2024

Kernel DMA Protection

Kernel Direct Memory Access (DMA) Protection is a security feature in Windows designed to prevent unauthorized access to memory by external peripherals.

Kernel DMA Protection requires UEFI firmware support, and Virtualization-based Security (VBS) isn’t required.

datasheet download

Kernel DMA protection on or off?

Kernel DMA Protection offers enhanced security measures for the system compared to the countermeasures against BitLocker DMA attacks, all while preserving the usability of external peripherals.

Disabling Kernel DMA Protection may be required for certain hardware that needs unrestricted access. However, it’s essential to understand the security risks involved before making this change.

To Disable Kernel DMA Protection 

To disable Kernel DMA Protection, follow these steps:

Via Windows Settings

  1. Press Windows + I to open Settings.
  2. Navigate to Privacy & Security > Windows Security > Open Windows Security.
  3. Go to Device Security > Core Isolation Details.
  4. Under Memory Access Protection, toggle the switch to Off. Enter your administrator credentials if prompted.
  5. Restart your system for the changes to apply.

Via BIOS (if the above method doesn’t work):

  1. Restart your PC and press the appropriate key (varies by manufacturer, e.g., F2, F10, or DEL) to access the BIOS setup.
  2. In the BIOS menu, go to the Security tab.
  3. Locate Kernel DMA Protection and set it to Disabled.
  4. Save changes and exit the BIOS.

Refer to your PC manufacturer’s manual for specific instructions, as BIOS layouts differ across devices.

Via GPO

To establish the recommended configuration via GP, set the following UI path to Enabled: Block All:

Computer ConfigurationPoliciesAdministrative TemplatesSystemKernel DMA
ProtectionEnumeration policy for external devices incompatible with Kernel
DMA Protection

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template DmaGuard.admx/adml that is included with the Microsoft Windows 10 Release 1809 & Server 2019 Administrative Templates (or newer).

Enumeration policy for external devices incompatible with Kernel DMA Protection

This policy aims to enhance security measures against external DMA-capable devices by offering increased control over the enumeration of such devices that may not support DMA Remapping or device memory isolation and sandboxing.

Note: This policy does not apply to 1394, PCMCIA or ExpressCard devices. The protection also only applies to Windows 10 R1803 or higher, and also requires a UEFI BIOS to function.

Note #2: More information on this feature is available at this link: Kernel DMA Protection for Thunderbolt™ 3 (Windows 10) | Microsoft Docs.

DMA Attacks and Kernel DMA Protection

DMA attacks exploit hardware functionality to bypass CPU controls and access system memory directly, potentially compromising sensitive data or taking control of the system.

How DMA Attacks Work

DMA allows devices to access memory without CPU involvement. Windows uses the IOMMU to block unauthorized peripherals unless their drivers support memory isolation (e.g., DMA-remapping). Kernel DMA Protection mitigates drive-by DMA attacks post-OS initialization, while firmware/BIOS must secure against attacks during boot via ports like Thunderbolt 3.

Examples of DMA Attacks

  1. FireWire (IEEE 1394): Attackers use malicious FireWire devices to access system memory directly.
  2. Thunderbolt: Exploits Thunderbolt’s DMA capabilities to access memory and compromise the system.
  3. GPU DMA: Vulnerable GPU drivers or firmware may allow attackers to misuse GPUs for unauthorized memory access.

Understanding these risks is essential for implementing proper safeguards.

Enable Kernel DMA Protection

Systems compatible with Kernel DMA Protection will activate the feature automatically, without any need for user or IT admin configuration.

You can verify whether Kernel DMA Protection is enabled using the Windows Security settings.

  1. Open Windows Security.
  2. Select Device security > Core isolation details > Memory access protection

memory access protection

(reference: Microsoft, Kernel DMA Protection)

Alternatively, you can use the System Information desktop app (msinfo32.exe). If the system supports Kernel DMA Protection, the Kernel DMA Protection value will be set to ON.

Kernel DMA Protection on

(reference: Microsoft, Kernel DMA Protection)

If the current state of Kernel DMA Protection is OFF and Hyper-V – Virtualization Enabled in Firmware is NO:

  • Reboot into UEFI settings
  • Turn on Intel Virtualization Technology
  • Turn on Intel Virtualization Technology for I/O (VT-d)
  • Reboot system into Windows

Hardening Kernel DMA Protection

Hardening Kernel DMA Protection refers to the process of enhancing the security of a system’s Direct Memory Access (DMA) by implementing measures to prevent unauthorized access to the system’s memory.

Automating the hardening process offers several advantages, making it the preferred approach for enhancing system security:

  • Manual configuration is prone to human error, which can leave systems vulnerable if proper settings are not applied consistently across the infrastructure.
  • Automation ensures that hardening measures like enabling IOMMU, disabling unnecessary DMA-capable interfaces, and applying least privilege mappings are implemented uniformly and reliably.
  • Automated processes can be triggered during system provisioning, updates, or on a recurring schedule to maintain the desired security posture.
  • Automation also simplifies the management and auditing of DMA protection policies, making it easier to validate compliance across a large number of systems.

Remember, hardening Kernel DMA Protection isn’t just an option, it’s an essential step in securing your digital domain. So, take charge and build a stronger, more resilient system today.

Ben Balkin
Ben Balkin is a professional writer and blogger specializing in technology and innovation. As a contributor to the Calcom blog, Ben shares practical insights, useful tips, and engaging articles designed to simplify complex processes and make advanced technological solutions accessible to everyone. His writing style is clear, insightful, and inspiring, reflecting his strong belief in technology's power to enhance quality of life and empower businesses.

Related Articles

HIPAA, HITRUST, CSF, And Server Hardening Part 2

HIPAA, HITRUST, CSF, And Server Hardening Part 2

June 29, 2025

Before we move forward with our exploration of HIPAA, HITRUST, and server hardening, let’s review…

How to prevent powershell attacks

How to prevent powershell attacks

September 30, 2020

PowerShell is a built-in scripting language and a command-line executor developed by Microsoft to provide…

Understanding Cryptographic Mechanisms 

Understanding Cryptographic Mechanisms 

December 2, 2024

Cryptographic mechanisms protect the integrity of audit tools by ensuring that the data they collect…

Ready to simplify compliance?

See automated compliance in action—book your demo today!

Share this article